# https://syzkaller.appspot.com/bug?id=5db1ce6279a56dfd7967b45ad5f3cfc1b0433fc0 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000001180)=ANY=[], 0x1, 0x58b, &(0x7f0000000bc0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xffffffbd)