# https://syzkaller.appspot.com/bug?id=70a12c89d398708fc4f2d9db0df8211ee5c1d72f # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"tmpdir":true} syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x800000, &(0x7f000000be40), 0x1, 0x4ae, &(0x7f0000000500)="$eJzs3UFPXF0ZAOD3XqBQPr4Pql2oUVtrtZqmMzBtSdNV3WhM08TYuHLRIkwJYYYhzFALdkH/g4lNXOlPcGHiwqQr9+5056YuTKo2mmLiYsy9M1CgDFBbmIT7PMnJveee6bzndHLPGd6BOQEU1sWI2IiIMxHxMCLGu9eTbok7nZI97s3rp7Obr5/OJtFu3/9Hkrdn12LHv8l80n3OkYj44fcifpK8G7e5tr44U6tVV7r1cqu+XG6urV9bqM/MV+erS5XK9NT05K3rNysfbawX6r959d2Fuz/6/e++8vKPG9/+WdatsW7bznF8TJ2hD23HyQxGxN3jCNYHA93xnOl3R/i/pBHxuYi4lN//4zGQv5oAwGnWbo9He3xnHQA47dI8B5akpW4uYCzStFTq5PDOx2haazRbVx81VpfmOrmyiRhKHy3UqpPdXOFEDCVZfSo/f1uv7Klfj4hzEfHz4bN5vTTbqM31840PABTYJ3vW/38Pd9Z/AOCUG+l3BwCAE2f9B4Disf4DQPFY/wGgeKz/AFA81n8AKB7rPwAUyg/u3ctKe7P7/ddzj9dWFxuPr81Vm4ul+upsabaxslyabzTm8+/sqR/2fLVGY3nqRqw+KbeqzVa5ubb+oN5YXWo9yL/X+0F16ERGBQAc5NyFF39OImLj9tm8xI69HKzVcLql/e4A0DcD/e4A0Dd2+4Li8jM+sM8Wvbvs+BWhs7sanh9Pf4Djd+WL8v9QVPL/UFzy/1Bc8v9QXO12Ys9/ACgYOX7gPT7/383n/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABTYWF6StNTdC3ws0rRUivg0IiZiKHm0UKtORsRnEfGn4aHhrD7V704DAB8o/VvS3f/ryvjlsb2tZ5L/DOfHiPjpL+//4slMq7UylV3/5/b11vPu9Uo/+g8AHGZrnd5ax7e8ef10dqucZH9efaezuWgWd7NbOi2DMZgfR2IoIkb/lXTrHdn7lYGPEH/jWUR8Yb/xJ3luZKK78+ne+FnsT080frorfpq3dY7Z/8Xn3z90zy1doSheZPPPnf3uvzQu5sf97/+RfIb6cFvz3+Y781+6Pf8N9Jj/Lh41xo0/fL9n27OILw3uFz/Zjp/0iH/5iPH/8uWvXurV1v5VxJXYP/7OWOVWfbncXFu/tlCfma/OV5cqlemp6clb129WynmOuryVqX7X329f/eyg8Y/2iD9yyPi/ccTx//q/D3/8tQPif+vr+7/+5w+In62J3zxi/JnR3/ac67P4cz3Gf9jrf/WI8V/+dX3uiA8FAE5Ac219caZWq644ceLEyfZJv2cm4Li9ven73RMAAAAAAAAAAAAAAKCXk/hzon6PEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgNPrfwEAAP//QiXZUg==") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f00000009c0)=ANY=[], 0x7a8, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x288000c, r0, 0x102})