# https://syzkaller.appspot.com/bug?id=47918174613db46c53bdf674594b8eb5db1881c5 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"tmpdir":true} syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200810, &(0x7f0000000a80)=ANY=[], 0xfe, 0x4b4, &(0x7f0000000540)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000080)='@\x00', 0x70f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x187842, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x3920e, r1})