# https://syzkaller.appspot.com/bug?id=ba84cc80a9491d65416bc7877e1650c87530fe8a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000000)=ANY=[], 0x1, 0x43c, &(0x7f0000000900)="$eJzs28tvG8UfAPDvrpP219cvoZRHH0CgICIeSZMW6IEDIJA4gIQEh3JMk7QqdRvUBIlWFS0IlRuoEnfEEYm/gBNcEHBC4gp3qFShXlo4Ga29mziubeLEiVP8+UjbzuxMNPP17MSzO9kA+tZI9k8SsTOp5Ydq2eUVRmr/3bpxcfqvGxenk6hU3vwzqda7eePidFG1+LkdeWY0jUg/TmJ/k3bnz184PVUuz57L8+MLZ94dnz9/4elTZ6ZOzp6cPTt59OiRwxPPPTv5TFfizOK6ue+DuQN7X3376uvTx64e//HrpIi/IY4uGWlX+FiXG+u1XXXpZKCHHaEjpYjIhmswIn6NoSjF0uANxSsf9bRzwLqqVCqVra2LL1eA/7Aket0DoDeKL/rs/rc4NmjpsSlcf7F2A5TFfSs/aiUDkeZ1Bhvub7tpJCKOXf77i+yI9XkOAQCwzLfZ+uepZuu/NO6tq/f/fA9lOCLuiojdEXF3ROyJiHsiqnXvi4j7O2y/cZPk9vVPem1Vga1Qtv57Pt/bWr7+K1Z/MVzKc7uq8Q8mJ06VZw/ln8loDG7N8hNt2vju5V8+a1VWv/7Ljqz9Yi2Y9+PaQMMDupmpham1xFzv+ocR+waaxZ8s7gQkEbE3Ivatso1TT3x1oFXZv8ffRhf2mSpfRjxeG//L0RB/IWm/Pzn+vyjPHhovrorb/fTzlTdatb+m+LsgG//tTa//xfiHk/r92vnO27jy2yeN9zSXisRqr/8tyVvV9Jb83PtTCwvnJiK2JK/l519YOj+59LNFvqifxT96sPn83x1Ln8T+iMgu4gci4sGIeCjv+8MR8UhEHGwT/w8vPfpOq7LNMP4zHY1/54nS6e+/WdbocCfxZ+N/pJoazc+s5PffSju41s8PAAAA7gRpROyMJB1bTKfp2Fjtb/j3xPa0PDe/8OSJuffOzmRl1eefafGka6jueehEfltf5Ccb8ofz58afl7ZV82PTc+WZXgcPfW5Hi/mf+b3U694B6877WtC/2s7/ZOP6AWw83//Qv8x/6F9N5v+2XvQD2HjNvv8v9aAfwMYbqL7iDvQj9//Qv8x/6F/mP/SltbzXL9EPiT8+rV0pjUWRbpYeSqxHYvnviePeBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO5Q/wQAAP//sQLk3g==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1'}, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x13, r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280))