# https://syzkaller.appspot.com/bug?id=c6e09f1460684d5ca2afdf19f6f77e5d27cc60e2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"","fault_call":-1,"close_fds":false} prlimit64(0x0, 0xe, 0x0, 0x0) getpid() write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x428040, 0x3a) open(0x0, 0x4800, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) syz_mount_image$msdos(0x0, 0x0, 0x5a014, 0x1, &(0x7f0000000180)=[{0x0}], 0x3000000, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}]})