# https://syzkaller.appspot.com/bug?id=ee68b39599cea3a9008d53ce28f78c8c8800be30 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} r0 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x40001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c03, r1) openat(0xffffffffffffff9c, 0x0, 0x9080, 0x28) open_tree(0xffffffffffffff9c, 0x0, 0x89901) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x8000000018, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9683dda1af1ea89de2b7fb0a0100000000000000000300", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e177d7bbe6970992861ac00", "90be8b1c551265406c7f306003d8a0f4bd00", [0x6, 0x7f]}}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_RESET_DIRTY_RINGS(0xffffffffffffffff, 0xaec7) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0185879, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)