# https://syzkaller.appspot.com/bug?id=ff834988a0e05a23199aa0230d9afa4b010c69d2 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$udf(&(0x7f00000004c0), &(0x7f0000000000)='./file1\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0x1, 0x492, &(0x7f0000000a40)="$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") open(&(0x7f00000005c0)='./bus\x00', 0x68842, 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x208e24b)