# https://syzkaller.appspot.com/bug?id=69d68b20fab45dda1a57ac65326005e06b5f6ab4 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$ext4(&(0x7f00000008c0)='ext4\x00', &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x90, &(0x7f0000000280)={[{@journal_dev={'journal_dev', 0x3d, 0x3}}, {@test_dummy_encryption}, {@stripe={'stripe', 0x3d, 0x1}}]}, 0x3, 0x466, &(0x7f0000000e00)="$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") mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0)